Skip to main content

SecureAuth IdP Appliance Certificate Renewal Utility (ACRU)

Use this guide to install and run the SecureAuth IdP Appliance Certificate Renewal Utility (ACRU) tool.

The ACRU tool helps to renew digital certificates on the SecureAuth IdP appliance. These certificates are crucial for establishing secure connections between SecureAuth IdP and other systems, such as Service Providers (SPs).

Prerequisites

Review

Be sure to meet all Prerequisites before installing and running the ACRU tool.

For any questions, please contact SecureAuth Support.

  • Have the latest intermediate certificates: SecureAuth Intermediate Certificates X1, X2, Sigma1, and Sigma2.

    Download link for the Intermediate Certificate zip bundle: CertsXSigma.zip

  • If you use SecureAuth Certificate Services with VPNs, MDMs, or Client-Side SSL integrations, the latest intermediate certificates must be uploaded to VPN devices, MDM devices, user workstations, and mobile devices before running the ACRU tool.

  • If SecureAuth IdP is integrated with any VPN or Gateway (Juniper, Cisco, Citrix, F5) using a vendor-specific thick client and a native X.509 personal certificate, then upload the SecureAuth CA Public Certificates to the VPN or Gateway, and all client workstations before running the ACRU.

    If there are no VPNs or gateways integrated with SecureAuth IdP, you can immediately use the ACRU tool.

  • If any firewalls are in place, open the following ports to enable access to the necessary IP addresses and URLs:

    TCP

    IP

    URL

    TCP 80 and 443

    208.82.207.89

    208.74.31.114

    146.88.110.112

    146.88.110.114

    162.216.42.110

    162.216.42.111

    us-certs.secureauth.com

    us-cloud.secureauth.com

    TCP 443

    See SecureAuth cloud services

    us-audit.secureauth.com

  • Contact Support to download the SecureAuth IdP Appliance Certificate Renewal Utility file.

    The name, size, and hash of this file is:

    • File name: SecureAuthApplianceCertificateRenewalUtility.msi

    • File size: 856 KB (876,544 bytes)

    • MD5 hash: c15520a622ae207e07be3f67a9ce4535

  1. Double-click the downloaded ACRU file, SecureAuthApplianceCertificateRenewalUtility.msi.

    35456217.png
  2. Click Run.

    35456218.png
  3. Once the ACRU Installation Wizard opens, click Next.

    35456219.png
  4. Leave the fields at their default values and click Next.

    35456220.png
  5. Click Next to confirm the installation.

    35456221.png

    Result: The installation runs.

  6. Once the installation is complete, click Close.

    35456222.png
  7. Proceed to the next section, Running ACRU.

Maintenance window

Run the ACRU tool during a maintenance window to avoid service disruptions.

After installing ACRU, run the tool on the primary SecureAuth IdP appliance.

  1. Locate the ACRU Tool in Drive-C > Program Files (x86) > SecureAuth > ApplianceCertRenewalUtility.

    35456223.png
  2. Double-click to open the SecureAuth.Tool.ApplianceCertRenewUtility.exe file.

    Run only once

    Run the ACRU tool to apply the updated certificates to the SecureAuth IdP appliance. Once completed, do not re-run the tool unless a future certificate update requires it.

    Result: The ACRU tool opens.

  3. Leave the configurations at their default values.

    Use default option

    Use the Through importing a PFX file option only if explictly instructed by SecureAuth Support. Otherwise, leave the default option selected as Through submitting a Certificate Signing Request.

    If a proxy is configured on the SecureAuth IdP appliance, click Proxy Settings before proceeding and perform the steps described in Proxy settings.

    run_acru_01.png

    Result: A warning message appears, click OK to confirm.

  4. Click Start.

    run_acru_02.png

    Result: The ACRU tool installs the certificates and updates the web.config.

  5. A prompt displays to stop the appliance instance. Click OK to continue.

    run_acru_03.png

    Result: The ACRU tool starts next phase of updates.

  6. Wait for the ACRU tool to update.

    run_acru_04.png

    Result: The ACRU updates the intermediate and root certificates in each SecureAuth IdP realm.

  7. When ACRU completes the updates, a prompt displays to reset the IIS server. Click Yes.

    run_acru_05.png

    Prompt to restart IIS server

    run_acru_06.png

    Restarting IIS server

    Result: It will restart the IIS server.

  8. Once the ACRU updates are complete, click Close.

    run_acru_07.png

    Result: The latest certificate updates are installed and updated on the SecureAuth IdP appliance.

  9. Confirm that the certificate updates are applied. See Confirm certificate updates.

Running ACRU on secondary IdP appliances

If you have secondary SecureAuth IdP appliances, you can apply certificate updates in the following ways:

  • Option 1 - Secondary IdP (non-file-synced) to have and use its own certificate: Repeat the same steps above to install and run the ACRU tool on the secondary IdP appliance.

  • Option 2 - Secondary IdP is synced with the primary IdP appliance: Export the new certificate from the primary IdP. Run the ACRU tool and select the Through importing a PFX file option.

    run_acru_08.png

Confirm certificate updates

Once the installation and update has been completed, confirm that the changes have been applied to the operating system of the appliance. These changes include:

Certificates Console

In the Certificates Console, verify that there is a new appliance certificate with latest expiration date.

cert_console_x-sigma.png

Old certificates may still be present in the Certificates Console, so make sure to select the correct one. To do this, look in the Certificate Details.

Certificate Details

Double-click the certificate, and on the Details tab, make sure that it shows:

  • X1 / X2 cert details

    • Signature algorithm: sha512ECDSA

    • Signature hash algorithm: sha512

  • Sigma1 / Sigma2 (RSA) cert details

    • Signature algorithm: sha384RSA

    • Signature hash algorithm: sha384

cert_details_sigma.png

SecureAuth IdP Web Admin - System Info

Verify that you have the correct certificate URLs in the SecureAuth IdP realms.

  1. In the SecureAuth IdP Web Admin for a selected realm, select the System Info tab.

  2. Scroll down to the SecureAuth Cloud Services section.

    In the Certificate URL, make sure the URL includes wither CertServiceX or CertServiceSigma (for RSA).

    webadmin_certservicex_url.png

    CertServiceX in cert URL

    webadmin_certservicesigma_url.png

    CertServiceSigma in cert URL